Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
cygnet [2015/11/13 11:29] – Confirm date and add details 127.0.0.1 | cygnet [2022/05/08 11:42] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | # Cygnet Crypto Party | + | ====== |
Everyone is invited to attend a Crypto Party! | Everyone is invited to attend a Crypto Party! | ||
- | ## Privacy matters | + | ===== Privacy matters |
Quote from the official **Crypto Party Handbook** | Quote from the official **Crypto Party Handbook** | ||
Line 9: | Line 9: | ||
" | " | ||
- | ##When & Where | + | ===== When & Where ===== |
- | 2 to 5pm **Sunday 20th December 2015** | + | |
- | **Cygnet Town Hall** upstairs in the Supper Room (Open Streetmap link) | + | |
- | ## What is it? | + | 2pm to 5pm **Sunday 20th December 2015** **Cygnet Town Hall** upstairs in the Supper Room [[https:// |
- | [Party like it is 1984](https:// | + | |
- | + A Crypto Party is a chance for people to learn about the digital landscape in relation to privacy and security | + | ===== What is it? ===== |
- | + If you want there will be people who will help you install and become familiar with privacy tools and techniques | + | [[https:// |
- | ## Reasons why? | + | * A Crypto Party is a chance for people to learn about the digital landscape in relation to privacy and security |
+ | * If you want there will be people who will help you install and become familiar with privacy tools and techniques | ||
- | + I have nothing to hide! | + | ===== Reasons why? ===== |
- | > But I have a bad feeling about my privacy and security | + | |
- | ## What's your level of interest? | + | * I have nothing to hide! |
+ | * But I have a bad feeling about my privacy and security | ||
+ | |||
+ | ===== What's your level of interest? | ||
In anticipation that their will be different levels of knowledge and interest there will be two sections | In anticipation that their will be different levels of knowledge and interest there will be two sections | ||
- | ### Hungry for information | + | ==== Hungry for information |
- | + A group for people who want background information | + | * A group for people who want background information |
+ | * Brief background talk | ||
+ | * Videos to watch | ||
+ | * Videos, documentation & software to download from local server onto USB drives if those attending wish to learn or experiment at a later date | ||
+ | * Lots of discussion (Questions & Answers, sharing stories) | ||
- | > Brief background talk | + | ==== Ready for action? ==== |
- | > Videos | + | * A group for those wanting |
+ | * There will be a local server with authenticated software packages for you to install onto your devices with guided assistance if required. | ||
+ | * Bring your phone, laptop and a USB disk (don't forget your power supply) | ||
+ | * Detailed information on tools and links below | ||
- | > Videos, documentation | + | ===== Tools & techniques ===== |
- | > Lots of discussion (Questions & Answers, sharing stories) | + | //topic summary//: |
- | ### Ready for action? | + | * Privacy & Identity authorisation (OpenPGP), Virus & mal-ware, Password management, Tracking & Meta-data, Anonymity & pseudo-anonymity, |
- | + A group for those wanting to set up their devices for better privacy | + | ===== Topics details ===== |
- | > There will be a local server with authenticated software packages for you to install onto your devices with guided assistance if required. | + | ==== Passwords ==== |
- | > Bring your phone, laptop and a USB disk (don't forget your power supply) | + | * Recommend passphrases |
- | + | * Pasword managment | |
- | > Detailed information on tools and links below | + | |
- | ## Tools & techniques | + | ==== Cryptography ==== |
- | *topic summary*: | + | |
+ | | ||
+ | * Public Key Infrastructure (PKI) = security, authentication, | ||
+ | * Encryption and Decryption = information is obfuscated by encryption. Can be a message, a file, a disk (storage medium) or // | ||
+ | * Common software tools are PGP (Pretty Good Privacy) & the open source GnuPG (or GPG = Gnu Privacy Guard) is a complete and free implementation of OpenPGP | ||
+ | * Secure Sockets Layer (SSL) https | ||
+ | * GnuPG or OpenPGP signatures - use a private key to sign a file. Anyone who has the corresponding public key can check whether the file was signed by the private key. Anyone who doesn’t have the private key cannot forge such a signature | ||
+ | * Verifying a file | ||
+ | * [[http:// | ||
+ | * Wireless security | ||
+ | * WAR driving risks | ||
+ | * Mac address spoofing | ||
+ | * [[https:// | ||
+ | * Method by which a communications service provider informs its users that the provider has not been served with a secret United States government subpoena | ||
+ | * Government surveillance +PRISM | ||
+ | * Big data | ||
+ | * Corporate risks | ||
+ | * Pay wave | ||
+ | * International Crime Syndicates +Lack of data security - Target, Sony Madison etc | ||
+ | * [[https:// | ||
+ | * Born out of the [[http:// | ||
+ | * VPN' | ||
+ | * Virtual Private Networks - encrypted communications via IP tunnels | ||
+ | * Dark Web | ||
+ | * Accessed via Tor using directories or shared links from trusted collegues rather than search engines | ||
+ | * Deep web | ||
+ | * The large protion of the Internet behind firewalls or part of a secure Wide Area restricted network | ||
+ | * Requires login & generally accessed via a VPN (Virtual Private network) | ||
+ | * Crypto currency | ||
+ | * Bitcoin and the block chain | ||
+ | * Distributed public ledger | ||
- | > Privacy & Identity authorisation (OpenPGP), Virus & mal-ware, Password management, Tracking & Meta-data, Anonymity & pseudo-anonymity, | + | ===== Live Distibutions ===== |
- | ## Topics details | + | List of known certification allowing booting from Secure Boot (UEFI = Unified Extensible Firmware Interface) BIOS |
- | ### Passwords | + | * Ubuntu and it's derivitaves (Mint) |
+ | * Debian | ||
+ | * Arch | ||
- | + Recommend passphrases | + | ===== Demonstrations ===== |
- | + Pasword managment and further recommendations | + | * [[http:// |
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
- | ### Cryptography | + | ===== Tools & resource links ===== |
- | + Basic Concept | + | **Do your part to resist Government surveillance and take back your privacy:** |
- | >Public key cryptography | + | ==== Computer Software ==== |
+ | * Browser Privacy: [[https:// | ||
+ | * VPNs: [[https:// | ||
+ | * Internet Anonymity: [[https:// | ||
+ | * Disk Encryption: [[http:// | ||
+ | * File/Email Encryption: [[https:// | ||
+ | * IM/Voice Encryption: [[http:// | ||
+ | * Phone/SMS Encryption: [[http:// | ||
+ | * Google Alternative: | ||
+ | * Digital P2P Currency: [[http:// | ||
+ | * Live Anonymous/ | ||
- | >Public Key Infrastructure (PKI) = security, authentication, | + | ==== Android Smart Phone ==== |
- | > | + | * [[https:// |
- | > | + | ==== Resourses & Information ==== |
- | >Common software | + | * General: [[https:// |
+ | * For Journalists: | ||
+ | * Coders: | ||
+ | * Passwords: [[http:// | ||
+ | * [[https:// | ||
+ | * Activists: [[https:// | ||
- | >Secure Sockets Layer (SSL) https | + | ===== Quotes ===== |
- | >GnuPG or OpenPGP signatures - use a private key to sign a file. Anyone who has the corresponding public key can check whether the file was signed by the private key. Anyone who doesn’t have the private key cannot forge such a signature | + | " |
- | + | ||
- | + Verifying a file | + | |
- | >[File checksum](http:// | + | |
- | + | ||
- | + Wireless security | + | |
- | > WAR driving risks | + | |
- | + | ||
- | >Mac address spoofing | + | |
- | + | ||
- | + [Canary watch](https:// | + | |
- | > Method by which a communications service provider informs its users that the provider has not been served with a secret United States government subpoena | + | |
- | + | ||
- | + Government surveillance | + | |
- | >PRISM | + | |
- | + | ||
- | + Big data | + | |
- | > | + | |
- | + | ||
- | >Pay wave | + | |
- | + | ||
- | + International Crime Syndicates | + | |
- | >Lack of data security - Target, Sony Madison etc | + | |
- | + [Tor](https:// | + | |
- | > Born out of the [onion routing project](http:// | + | |
- | + | ||
- | + VPN' | + | |
- | > | + | |
- | + | ||
- | + Dark Web | + | |
- | > Accessed via Tor using directories or shared links from trusted collegues rather than search engines | + | |
- | + | ||
- | + Deep web | + | |
- | > The large protion of the Internet behind firewalls or part of a secure Wide Area restricted network | + | |
- | + | ||
- | > Requires login & generally accessed via a VPN (Virtual Private network) | + | |
- | + | ||
- | + Crypto currency | + | |
- | > Bitcoin and the block chain | + | |
- | + | ||
- | > Distributed public ledger | + | |
- | + | ||
- | ## Live Distros | + | |
- | + | ||
- | Only listing these because they are known to have certification for modern Secure Boot (UEFI = Unified Extensible Firmware Interface) BIOS | + | |
- | + | ||
- | + Ubuntu and it's derivitaves (Mint) | + | |
- | + | ||
- | + Debian | + | |
- | + | ||
- | * Arch | + | |
- | + | ||
- | ## Demonstrations | + | |
- | + | ||
- | > | + | |
- | + | ||
- | > | + | |
- | + | ||
- | > | + | |
- | + | ||
- | > | + | |
- | + | ||
- | ## Tools & resource links | + | |
- | + | ||
- | **Do your part to resist Government surveillance and take back your privacy: | + | |
- | ### Computer Software | + | |
- | * Browser Privacy: [HTTPS Everywhere](https:// | + | |
- | * VPNs: [Risup.net](https:// | + | |
- | * Internet Anonymity: [Tor](https:// | + | |
- | * Disk Encryption: [TrueCrypt](http:// | + | |
- | * File/Email Encryption: [GPGTools](https:// | + | |
- | * Instant Messaging (IM) Encryption: [Pidgin](http:// | + | |
- | * IM/Voice Encryption: [Mumble](http:// | + | |
- | * Phone/SMS Encryption: [WhisperSystems](http:// | + | |
- | * Google Alternative: | + | |
- | * Digital P2P Currency: [BitCoin](http:// | + | |
- | * Live Anonymous/ | + | |
- | + | ||
- | ### Android Smart Phone | + | |
- | + [F-Droid](https:// | + | |
- | + | ||
- | ### Resourses & Information | + | |
- | + General: [EFF's Surveillance Self-Defense Project](https:// | + | |
- | + For Journalists: | + | |
- | + Coders: | + | |
- | + Passwords: [xkcd: Password Strength](http:// | + | |
- | + [Nineteen Eighty-Four](https:// | + | |
- | + Activists: [Workbook on security: practical steps for human rights defenders at risk](www.frontlinedefenders.org) | + | |
- | ##Quotes | + | |
- | + | ||
- | " | + | |
" | " | ||
- | |||
" | " | ||
Line 189: | Line 154: | ||
"Data is the pollution of the information age" | "Data is the pollution of the information age" | ||
+ | ====== Cygnet CryptoParty Poster ====== | ||
+ | |||
+ | {{: | ||
+ | |||
+ | {{: |